1 | Debug information for team /boot/system/bin/bash (14580):
|
---|
2 | CPU(s): 8x AMD FX-Series
|
---|
3 | Memory: 15.95 GiB total, 463.70 MiB used
|
---|
4 | Haiku revision: hrev46551-dirty [master] Dec 17 (BePC)
|
---|
5 |
|
---|
6 | Active Threads:
|
---|
7 | thread 14588: team 14580 debug task
|
---|
8 | thread 14580: sh (main)
|
---|
9 | state: Exception (Segment violation)
|
---|
10 |
|
---|
11 | Frame IP Function Name
|
---|
12 | -----------------------------------------------
|
---|
13 | 00000000 0xfc0a34 dispose_words + 0
|
---|
14 | Disassembly:
|
---|
15 | dispose_words:
|
---|
16 | 0x00fc0a34: 55 push %ebp <--
|
---|
17 |
|
---|
18 | Frame memory:
|
---|
19 |
|
---|
20 | 0x72143390 0xfc5c87 execute_simple_command + 0x91f
|
---|
21 | 0x721433f0 0xfc15bd execute_command_internal + 0x62d
|
---|
22 | 0x72143440 0x101e2c6 parse_and_execute + 0x33e
|
---|
23 | 0x72143470 0x1021961 eval_builtin + 0x59
|
---|
24 | 0x721434b0 0xfc5e7e execute_builtin + 0x176
|
---|
25 | 0x721434e0 0xfc68a4 execute_builtin_or_function + 0xcc
|
---|
26 | 0x72143540 0xfc5ad1 execute_simple_command + 0x769
|
---|
27 | 0x721435a0 0xfc15bd execute_command_internal + 0x62d
|
---|
28 | 0x721435f0 0xfc0dad execute_command + 0x5d
|
---|
29 | 0x72143630 0xfc328a execute_connection + 0x1a2
|
---|
30 | 0x72143690 0xfc1873 execute_command_internal + 0x8e3
|
---|
31 | 0x721436e0 0xfc0dad execute_command + 0x5d
|
---|
32 | 0x72143720 0xfc328a execute_connection + 0x1a2
|
---|
33 | 0x72143780 0xfc1873 execute_command_internal + 0x8e3
|
---|
34 | 0x721437d0 0xfc0dad execute_command + 0x5d
|
---|
35 | 0x72143810 0xfc328a execute_connection + 0x1a2
|
---|
36 | 0x72143870 0xfc1873 execute_command_internal + 0x8e3
|
---|
37 | 0x721438c0 0xfc0dad execute_command + 0x5d
|
---|
38 | 0x721438f0 0xfc4ac4 execute_if_command + 0xd8
|
---|
39 | 0x72143940 0xfc17e7 execute_command_internal + 0x857
|
---|
40 | 0x72143990 0xfc32da execute_connection + 0x1f2
|
---|
41 | 0x721439f0 0xfc1873 execute_command_internal + 0x8e3
|
---|
42 | 0x72143a50 0xfc1854 execute_command_internal + 0x8c4
|
---|
43 | 0x72143ab0 0xfc6463 execute_function + 0x55b
|
---|
44 | 0x72143af0 0xfc68c8 execute_builtin_or_function + 0xf0
|
---|
45 | 0x72143b50 0xfc5ad1 execute_simple_command + 0x769
|
---|
46 | 0x72143bb0 0xfc15bd execute_command_internal + 0x62d
|
---|
47 | 0x72143c00 0xfc32da execute_connection + 0x1f2
|
---|
48 | 0x72143c60 0xfc1873 execute_command_internal + 0x8e3
|
---|
49 | 0x72143cb0 0xfc0dad execute_command + 0x5d
|
---|
50 | 0x72143cf0 0xfc328a execute_connection + 0x1a2
|
---|
51 | 0x72143d50 0xfc1873 execute_command_internal + 0x8e3
|
---|
52 | 0x72143da0 0xfc0dad execute_command + 0x5d
|
---|
53 | 0x72143de0 0xfc328a execute_connection + 0x1a2
|
---|
54 | 0x72143e40 0xfc1873 execute_command_internal + 0x8e3
|
---|
55 | 0x72143e90 0xfc0dad execute_command + 0x5d
|
---|
56 | 0x72143ed0 0xfc328a execute_connection + 0x1a2
|
---|
57 | 0x72143f30 0xfc1873 execute_command_internal + 0x8e3
|
---|
58 | 0x72143f80 0xfc0dad execute_command + 0x5d
|
---|
59 | 0x72143fb0 0xfc4ac4 execute_if_command + 0xd8
|
---|
60 | 0x72144000 0xfc17e7 execute_command_internal + 0x857
|
---|
61 | 0x72144050 0xfc32da execute_connection + 0x1f2
|
---|
62 | 0x721440b0 0xfc1873 execute_command_internal + 0x8e3
|
---|
63 | 0x72144100 0xfc0dad execute_command + 0x5d
|
---|
64 | 0x72144140 0xfc328a execute_connection + 0x1a2
|
---|
65 | 0x721441a0 0xfc1873 execute_command_internal + 0x8e3
|
---|
66 | 0x721441f0 0xfc0dad execute_command + 0x5d
|
---|
67 | 0x72144230 0xfc328a execute_connection + 0x1a2
|
---|
68 | 0x72144290 0xfc1873 execute_command_internal + 0x8e3
|
---|
69 | 0x721442e0 0xfc0dad execute_command + 0x5d
|
---|
70 | 0x72144320 0xfc328a execute_connection + 0x1a2
|
---|
71 | 0x72144380 0xfc1873 execute_command_internal + 0x8e3
|
---|
72 | 0x721443e0 0xfc1854 execute_command_internal + 0x8c4
|
---|
73 | 0x72144440 0xfc6463 execute_function + 0x55b
|
---|
74 | 0x72144480 0xfc68c8 execute_builtin_or_function + 0xf0
|
---|
75 | 0x721444e0 0xfc5ad1 execute_simple_command + 0x769
|
---|
76 | 0x72144540 0xfc15bd execute_command_internal + 0x62d
|
---|
77 | 0x72144590 0xfc0dad execute_command + 0x5d
|
---|
78 | 0x721445d0 0xfc34b5 execute_connection + 0x3cd
|
---|
79 | 0x72144630 0xfc1873 execute_command_internal + 0x8e3
|
---|
80 | 0x72144690 0xfc1854 execute_command_internal + 0x8c4
|
---|
81 | 0x721446e0 0xfc0dad execute_command + 0x5d
|
---|
82 | 0x72144720 0xfc34b5 execute_connection + 0x3cd
|
---|
83 | 0x72144780 0xfc1873 execute_command_internal + 0x8e3
|
---|
84 | 0x721447d0 0xfc0dad execute_command + 0x5d
|
---|
85 | 0x72144800 0xfbba83 reader_loop + 0x1eb
|
---|
86 | 0x72144860 0xfb9a85 main + 0x8dd
|
---|
87 | 0x72144890 0xfaef76 _start + 0x56
|
---|
88 | 0x721448c0 0x384d68 runtime_loader + 0x130
|
---|
89 | 00000000 0x61210250 commpage_thread_exit + 0
|
---|
90 |
|
---|
91 | Registers:
|
---|
92 | eip: 0x00fc0a34
|
---|
93 | esp: 0x72143344
|
---|
94 | ebp: 0x72143390
|
---|
95 | eax: 0x00000000
|
---|
96 | ebx: 0x0105e038
|
---|
97 | ecx: 0x19115f90
|
---|
98 | edx: 0x00000000
|
---|
99 | esi: 0xffffffff
|
---|
100 | edi: 0x190b795e
|
---|
101 | cs: 0x001b
|
---|
102 | ds: 0x0023
|
---|
103 | es: 0x0023
|
---|
104 | fs: 0x00f3
|
---|
105 | gs: 0x0023
|
---|
106 | ss: 0x0023
|
---|
107 |
|
---|
108 | Loaded Images:
|
---|
109 | ID Text Base Text End Data Base Data End Type Name
|
---|
110 | --------------------------------------------------------------------------------
|
---|
111 | 205074 0x00375000 0x00392000 0x00392000 0x00395000 lib /boot/system/runtime_loader
|
---|
112 | 205075 0x00f8b000 0x0105d000 0x0105d000 0x0106f000 app /boot/system/bin/bash
|
---|
113 | 205076 0x01b9a000 0x01c65000 0x01c65000 0x01caf000 lib /boot/system/lib/libroot.so
|
---|
114 | 205073 0x61210000 0x61218000 0x00000000 0x00000000 system commpage
|
---|
115 |
|
---|
116 | Areas:
|
---|
117 | ID Base End Size (KiB) Protection Locking Name
|
---|
118 | --------------------------------------------------------------------------------
|
---|
119 | 647433 0x00130000 0x00131000 4 rw-S full _rld_debug_
|
---|
120 | 647432 0x00144000 0x00154000 64 rw- full rld heap
|
---|
121 | 647429 0x00375000 0x00392000 116 r-x full runtime_loader_seg0ro
|
---|
122 | 647430 0x00392000 0x00394000 8 rw- full runtime_loader_seg1rw
|
---|
123 | 647431 0x00394000 0x00395000 4 rw- full runtime_loader_bss1
|
---|
124 | 647434 0x00f8b000 0x0105d000 840 r-x full bash_seg0ro
|
---|
125 | 647435 0x0105d000 0x0106c000 60 rw- full bash_seg1rw
|
---|
126 | 647436 0x0106c000 0x0106f000 12 rw- full bash_seg2rw
|
---|
127 | 647437 0x01b9a000 0x01c65000 812 r-x full libroot.so_seg0ro
|
---|
128 | 647438 0x01c65000 0x01c77000 72 rw- full libroot.so_seg1rw
|
---|
129 | 647439 0x01c77000 0x01caf000 224 rw- full libroot.so_seg2rw
|
---|
130 | 647440 0x1909d000 0x1913d000 640 rw- full heap
|
---|
131 | 647428 0x61210000 0x61218000 32 r-xSk full commpage
|
---|
132 | 647426 0x61929000 0x6192d000 16 rw- full user area
|
---|
133 | 647427 0x71141000 0x72146000 16404 rw-s full sh_14580_stack
|
---|
134 |
|
---|
135 | Protection Flags: r - read, w - write, x - execute, s - stack, o - overcommit, c - cloneable, S - shared, k - kernel
|
---|
136 |
|
---|
137 | Semaphores:
|
---|
138 | ID Count Last Holder Name
|
---|
139 | ------------------------------------------------------------
|
---|